Firewall Queries
暂无分享,去创建一个
[1] Avishai Wool,et al. Fang: a firewall analysis engine , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[2] Scott Hazelhurst,et al. Algorithms for improving the dependability of firewall and filter rule lists , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[3] Marcus J. Ranum,et al. Web Security Sourcebook , 1997 .
[4] Avishai Wool. Architecting the Lumeta Firewall Analyzer , 2001, USENIX Security Symposium.
[5] George Varghese,et al. Packet classification for core routers: is there an alternative to CAMs? , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Sonia Fahmy,et al. Refereed papers: A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals1 1This work was supported by sponsers of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. , 2001 .
[7] Sonia Fahmy,et al. A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals , 2001, Comput. Secur..
[8] Guru M. Parulkar,et al. Detecting and resolving packet filter conflicts , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[9] Pankaj Gupta,et al. Algorithms for routing lookups and packet classification , 2000 .
[10] Sonia Fahmy,et al. Analysis of vulnerabilities in Internet firewalls , 2003, Comput. Secur..
[11] David Eppstein,et al. Internet packet filter management and rectangle geometry , 2000, SODA '01.
[12] Martin Freiss,et al. Protecting Networks with SATAN , 1998 .
[13] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[14] Pasi Eronen,et al. An expert system for analyzing firewall rules , 2001 .
[15] Nick McKeown,et al. Algorithms for packet classification , 2001, IEEE Netw..
[16] Joshua D. Guttman,et al. Filtering postures: local enforcement for global policies , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[17] Avishai Wool,et al. Firmato: A novel firewall management toolkit , 2004, TOCS.
[18] Dan Farmer,et al. Improving the Security of Your Site by Breaking Into it , 2000 .
[19] Linda Pesante,et al. CERT® Coordination Center , 2002 .
[20] Avishai Wool,et al. A quantitative study of firewall configuration errors , 2004, Computer.
[21] Martin Freiss. Protecting networks with SATAN - internet security for system administrators , 1998 .
[22] George Varghese,et al. Fast and scalable conflict detection for packet classifiers , 2003, Comput. Networks.
[23] Morris Sloman,et al. Policy Conflict Analysis in Distributed System Management , 1994 .
[24] Mohamed G. Gouda,et al. Firewall design: consistency, completeness, and compactness , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..